Introduction to Information Security Chapter N

Download Report

Transcript Introduction to Information Security Chapter N

Threats and Attacks
Principles of Information Security, 2nd Edition
1
Learning Objectives
Upon completion of this material, you should be able to:
 Identify and understand the threats posed to information
security
 Identify and understand the more common attacks
associated with those threats
Principles of Information Security, 2nd Edition
2
Threats
 Threat: an object, person, or other entity that represents a
constant danger to an asset
 Management must be informed of the different threats
facing the organization
 By examining each threat category, management
effectively protects information through policy, education,
training, and technology controls
Principles of Information Security, 2nd Edition
3
Threats (continued)
 The 2004 Computer Security Institute (CSI)/Federal
Bureau of Investigation (FBI) survey found:
 79 percent of organizations reported cyber security
breaches within the last 12 months
 54 percent of those organizations reported financial losses
totaling over $141 million
Principles of Information Security, 2nd Edition
4
Threats to Information Security
Principles of Information Security, 2nd Edition
5
Acts of Human Error or Failure
 Includes acts performed without malicious intent
 Causes include:
 Inexperience
 Improper training
 Incorrect assumptions
 Employees are among the greatest threats to an
organization’s data
Principles of Information Security, 2nd Edition
6
Acts of Human Error or Failure (continued)
 Employee mistakes can easily lead to:
 Revelation of classified data
 Entry of erroneous data
 Accidental data deletion or modification
 Data storage in unprotected areas
 Failure to protect information
 Many of these threats can be prevented with controls
Principles of Information Security, 2nd Edition
7
Figure 2-1 – Acts of Human Error or
Failure
Principles of Information Security, 2nd Edition
8
Deliberate Acts of Espionage or Trespass
 Access of protected information by unauthorized individuals
 Competitive intelligence (legal) vs. industrial
espionage (illegal)
 Shoulder surfing occurs anywhere a person accesses
confidential information
 Controls let trespassers know they are encroaching on
organization’s cyberspace
 Hackers uses skill, guile, or fraud to bypass controls
protecting others’ information
Principles of Information Security, 2nd Edition
9
Principles of Information Security, 2nd Edition
10
Deliberate Acts of Theft
 Illegal taking of another’s physical, electronic, or
intellectual property
 Physical theft is controlled relatively easily
 Electronic theft is more complex problem; evidence of
crime not readily apparent
Principles of Information Security, 2nd Edition
11
Deliberate Software Attacks
 Malicious software (malware) designed to damage,
destroy, or deny service to target systems
 Includes viruses, worms, Trojan horses, logic bombs,
back doors, and denial-of-services attacks
Principles of Information Security, 2nd Edition
12
Principles of Information Security, 2nd Edition
13
Forces of Nature
 Forces of nature are among the most dangerous threats
 Disrupt not only individual lives, but also storage,
transmission, and use of information
 Organizations must implement controls to limit damage
and prepare contingency plans for continued operations
Principles of Information Security, 2nd Edition
14
Deviations in Quality of Service
 Includes situations where products or services not
delivered as expected
 Information system depends on many interdependent
support systems
 Internet service, communications, and power irregularities
dramatically affect availability of information and systems
Principles of Information Security, 2nd Edition
15
Internet Service Issues
 Internet service provider (ISP) failures can considerably
undermine availability of information
 Outsourced Web hosting provider assumes responsibility
for all Internet services as well as hardware and Web site
operating system software
Principles of Information Security, 2nd Edition
16
Attacks
 Act or action that exploits vulnerability (i.e., an identified
weakness) in controlled system
 Accomplished by threat agent which damages or steals
organization’s information
Principles of Information Security, 2nd Edition
17
Table 2-2 - Attack Replication
Vectors
New Table
Principles of Information Security, 2nd Edition
18
Attacks (continued)
 Malicious code: includes execution of viruses, worms,
Trojan horses, and active Web scripts with intent to
destroy or steal information
 Back door: gaining access to system or network using
known or previously unknown/newly discovered access
mechanism
Principles of Information Security, 2nd Edition
19
Attacks (continued)
 Password crack: attempting to reverse calculate a
password
 Brute force: trying every possible combination of options
of a password
 Dictionary: selects specific accounts to attack and uses
commonly used passwords (i.e., the dictionary) to guide
guesses
Principles of Information Security, 2nd Edition
20
Attacks (continued)
 Spoofing: technique used to gain unauthorized access;
intruder assumes a trusted IP address
 Man-in-the-middle: attacker monitors network packets,
modifies them, and inserts them back into network
 Spam: unsolicited commercial e-mail; more a nuisance
than an attack, though is emerging as a vector for some
attacks
Principles of Information Security, 2nd Edition
21
Principles of Information Security, 2nd Edition
22
Figure 2-11 - Man-in-the-Middle
Principles of Information Security, 2nd Edition
23
Attacks (continued)
 Mail bombing: also a DoS; attacker routes large quantities
of e-mail to target
 Sniffers: program or device that monitors data traveling
over network; can be used both for legitimate purposes
and for stealing information from a network
 Social engineering: using social skills to convince people
to reveal access credentials or other valuable information
to attacker
Principles of Information Security, 2nd Edition
24
Attacks (continued)
 Buffer overflow: application error occurring when more
data is sent to a buffer than can be handled
 Timing attack: relatively new; works by exploring contents
of a Web browser’s cache to create malicious cookie
Principles of Information Security, 2nd Edition
25
Attacks (continued)
 Denial-of-service (DoS): attacker sends large number of
connection or information requests to a target
 Target system cannot handle successfully along with
other, legitimate service requests
 May result in system crash or inability to perform
ordinary functions
 Distributed denial-of-service (DDoS): coordinated stream
of requests is launched against target from many
locations simultaneously
Principles of Information Security, 2nd Edition
26
Figure 2-9 - Denial-of-Service
Attacks
Principles of Information Security, 2nd Edition
27
CSE551 Handout on DDoS and Worm
28
CSE551 Handout on DDoS and Worm
29
CSE551 Handout on DDoS and Worm
30
What Makes DDoS Attacks Possible?




Internet was designed with functionality & not security in mind
Internet security is highly interdependent
Internet resources are limited
Power of many is greater than power of a few
CSE551 Handout on DDoS and Worm
31
Summary
 Threat: object, person, or other entity representing a
constant danger to an asset
 Attack: a deliberate act that exploits vulnerability
Principles of Information Security, 2nd Edition
32